system

package
v0.0.0-...-3e34f99 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 25, 2023 License: Apache-2.0 Imports: 7 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

This section is empty.

Types

type Certificate

type Certificate struct {
	pulumi.CustomResourceState

	// Authority Key Identifier.
	Akid          pulumi.StringOutput `pulumi:"akid"`
	Authority     pulumi.StringOutput `pulumi:"authority"`
	Ca            pulumi.StringOutput `pulumi:"ca"`
	CaCrlHost     pulumi.StringOutput `pulumi:"caCrlHost"`
	CaFingerprint pulumi.StringOutput `pulumi:"caFingerprint"`
	// Common Name (e.g. server FQDN or YOUR name).
	CommonName pulumi.StringOutput    `pulumi:"commonName"`
	CopyFrom   pulumi.StringPtrOutput `pulumi:"copyFrom"`
	// Country Name (2 letter code).
	Country pulumi.StringPtrOutput `pulumi:"country"`
	Crl     pulumi.StringOutput    `pulumi:"crl"`
	// Certificate lifetime.
	DaysValid       pulumi.IntOutput  `pulumi:"daysValid"`
	DigestAlgorithm pulumi.BoolOutput `pulumi:"digestAlgorithm"`
	Dsa             pulumi.BoolOutput `pulumi:"dsa"`
	// Set to true if certificate is expired.
	Expired      pulumi.BoolOutput   `pulumi:"expired"`
	ExpiresAfter pulumi.StringOutput `pulumi:"expiresAfter"`
	Fingerprint  pulumi.StringOutput `pulumi:"fingerprint"`
	// The date after which certificate wil be invalid.
	InvalidAfter pulumi.StringOutput `pulumi:"invalidAfter"`
	// The date before which certificate is invalid.
	InvalidBefore pulumi.StringOutput `pulumi:"invalidBefore"`
	Issued        pulumi.StringOutput `pulumi:"issued"`
	Issuer        pulumi.StringOutput `pulumi:"issuer"`
	KeySize       pulumi.StringOutput `pulumi:"keySize"`
	KeyType       pulumi.StringOutput `pulumi:"keyType"`
	// Detailed key usage descriptions can be found in RFC 5280.
	KeyUsages pulumi.StringArrayOutput `pulumi:"keyUsages"`
	// Locality Name (eg, city).
	Locality pulumi.StringPtrOutput `pulumi:"locality"`
	// Name of the certificate. Name can be edited.
	Name pulumi.StringOutput `pulumi:"name"`
	// Organizational Unit Name (eg, section)
	Organization   pulumi.StringPtrOutput     `pulumi:"organization"`
	PrivateKey     pulumi.BoolOutput          `pulumi:"privateKey"`
	ReqFingerprint pulumi.StringOutput        `pulumi:"reqFingerprint"`
	Revoked        pulumi.StringOutput        `pulumi:"revoked"`
	ScepUrl        pulumi.StringOutput        `pulumi:"scepUrl"`
	SerialNumber   pulumi.StringOutput        `pulumi:"serialNumber"`
	Signs          CertificateSignArrayOutput `pulumi:"signs"`
	// Subject Key Identifier.
	Skid         pulumi.StringOutput `pulumi:"skid"`
	SmartCardKey pulumi.StringOutput `pulumi:"smartCardKey"`
	// State or Province Name (full name).
	State pulumi.StringPtrOutput `pulumi:"state"`
	// Shows current status of scep client.
	Status pulumi.StringOutput `pulumi:"status"`
	// SANs (subject alternative names).
	SubjectAltName pulumi.StringPtrOutput `pulumi:"subjectAltName"`
	// If set to yes certificate is included 'in trusted certificate chain'.
	Trusted pulumi.BoolPtrOutput `pulumi:"trusted"`
	// Organizational Unit Name (eg, section).
	Unit pulumi.StringPtrOutput `pulumi:"unit"`
	// contains filtered or unexported fields
}

## Example Usage

```go package main

import (

"github.com/pulumi/pulumi-routeros/sdk/go/routeros/System"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		rootCa, err := System.NewCertificate(ctx, "rootCa", &System.CertificateArgs{
			CommonName: pulumi.String("RootCA"),
			KeyUsages: pulumi.StringArray{
				pulumi.String("key-cert-sign"),
				pulumi.String("crl-sign"),
			},
			Trusted: pulumi.Bool(true),
			Signs: system.CertificateSignArray{
				nil,
			},
		})
		if err != nil {
			return err
		}
		_, err = System.NewCertificate(ctx, "serverCrt", &System.CertificateArgs{
			CommonName: pulumi.String("server.crt"),
			KeyUsages: pulumi.StringArray{
				pulumi.String("digital-signature"),
				pulumi.String("key-encipherment"),
				pulumi.String("tls-server"),
			},
			Signs: system.CertificateSignArray{
				&system.CertificateSignArgs{
					Ca: rootCa.Name,
				},
			},
		})
		if err != nil {
			return err
		}
		_, err = System.NewCertificate(ctx, "clientCrt", &System.CertificateArgs{
			CommonName: pulumi.String("client.crt"),
			KeySize:    pulumi.String("prime256v1"),
			KeyUsages: pulumi.StringArray{
				pulumi.String("digital-signature"),
				pulumi.String("key-agreement"),
				pulumi.String("tls-client"),
			},
			Signs: system.CertificateSignArray{
				&system.CertificateSignArgs{
					Ca: rootCa.Name,
				},
			},
		})
		if err != nil {
			return err
		}
		_, err = System.NewCertificate(ctx, "unsignedCrt", &System.CertificateArgs{
			CommonName:     pulumi.String("unsigned.crt"),
			KeySize:        pulumi.String("1024"),
			SubjectAltName: pulumi.String("DNS:router.lan,DNS:myrouter.lan,IP:192.168.88.1"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}

```

## Import

#The ID can be found via API or the terminal #The command for the terminal is -> :put [/certificate get [print show-ids]] #If you plan to manipulate the certificate requiring signing, you need to correctly fill in the sign{} section. #Changes in the sign{} section will not cause changes in the certificate. It's not a bug, it's a feature!

```sh

$ pulumi import routeros:System/certificate:Certificate client *9D

```

func GetCertificate

func GetCertificate(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *CertificateState, opts ...pulumi.ResourceOption) (*Certificate, error)

GetCertificate gets an existing Certificate resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewCertificate

func NewCertificate(ctx *pulumi.Context,
	name string, args *CertificateArgs, opts ...pulumi.ResourceOption) (*Certificate, error)

NewCertificate registers a new resource with the given unique name, arguments, and options.

func (*Certificate) ElementType

func (*Certificate) ElementType() reflect.Type

func (*Certificate) ToCertificateOutput

func (i *Certificate) ToCertificateOutput() CertificateOutput

func (*Certificate) ToCertificateOutputWithContext

func (i *Certificate) ToCertificateOutputWithContext(ctx context.Context) CertificateOutput

type CertificateArgs

type CertificateArgs struct {

	// Common Name (e.g. server FQDN or YOUR name).
	CommonName pulumi.StringInput
	CopyFrom   pulumi.StringPtrInput
	// Country Name (2 letter code).
	Country pulumi.StringPtrInput
	// Certificate lifetime.
	DaysValid pulumi.IntPtrInput
	KeySize   pulumi.StringPtrInput
	// Detailed key usage descriptions can be found in RFC 5280.
	KeyUsages pulumi.StringArrayInput
	// Locality Name (eg, city).
	Locality pulumi.StringPtrInput
	// Name of the certificate. Name can be edited.
	Name pulumi.StringPtrInput
	// Organizational Unit Name (eg, section)
	Organization pulumi.StringPtrInput
	Signs        CertificateSignArrayInput
	// State or Province Name (full name).
	State pulumi.StringPtrInput
	// SANs (subject alternative names).
	SubjectAltName pulumi.StringPtrInput
	// If set to yes certificate is included 'in trusted certificate chain'.
	Trusted pulumi.BoolPtrInput
	// Organizational Unit Name (eg, section).
	Unit pulumi.StringPtrInput
	// contains filtered or unexported fields
}

The set of arguments for constructing a Certificate resource.

func (CertificateArgs) ElementType

func (CertificateArgs) ElementType() reflect.Type

type CertificateArray

type CertificateArray []CertificateInput

func (CertificateArray) ElementType

func (CertificateArray) ElementType() reflect.Type

func (CertificateArray) ToCertificateArrayOutput

func (i CertificateArray) ToCertificateArrayOutput() CertificateArrayOutput

func (CertificateArray) ToCertificateArrayOutputWithContext

func (i CertificateArray) ToCertificateArrayOutputWithContext(ctx context.Context) CertificateArrayOutput

type CertificateArrayInput

type CertificateArrayInput interface {
	pulumi.Input

	ToCertificateArrayOutput() CertificateArrayOutput
	ToCertificateArrayOutputWithContext(context.Context) CertificateArrayOutput
}

CertificateArrayInput is an input type that accepts CertificateArray and CertificateArrayOutput values. You can construct a concrete instance of `CertificateArrayInput` via:

CertificateArray{ CertificateArgs{...} }

type CertificateArrayOutput

type CertificateArrayOutput struct{ *pulumi.OutputState }

func (CertificateArrayOutput) ElementType

func (CertificateArrayOutput) ElementType() reflect.Type

func (CertificateArrayOutput) Index

func (CertificateArrayOutput) ToCertificateArrayOutput

func (o CertificateArrayOutput) ToCertificateArrayOutput() CertificateArrayOutput

func (CertificateArrayOutput) ToCertificateArrayOutputWithContext

func (o CertificateArrayOutput) ToCertificateArrayOutputWithContext(ctx context.Context) CertificateArrayOutput

type CertificateInput

type CertificateInput interface {
	pulumi.Input

	ToCertificateOutput() CertificateOutput
	ToCertificateOutputWithContext(ctx context.Context) CertificateOutput
}

type CertificateMap

type CertificateMap map[string]CertificateInput

func (CertificateMap) ElementType

func (CertificateMap) ElementType() reflect.Type

func (CertificateMap) ToCertificateMapOutput

func (i CertificateMap) ToCertificateMapOutput() CertificateMapOutput

func (CertificateMap) ToCertificateMapOutputWithContext

func (i CertificateMap) ToCertificateMapOutputWithContext(ctx context.Context) CertificateMapOutput

type CertificateMapInput

type CertificateMapInput interface {
	pulumi.Input

	ToCertificateMapOutput() CertificateMapOutput
	ToCertificateMapOutputWithContext(context.Context) CertificateMapOutput
}

CertificateMapInput is an input type that accepts CertificateMap and CertificateMapOutput values. You can construct a concrete instance of `CertificateMapInput` via:

CertificateMap{ "key": CertificateArgs{...} }

type CertificateMapOutput

type CertificateMapOutput struct{ *pulumi.OutputState }

func (CertificateMapOutput) ElementType

func (CertificateMapOutput) ElementType() reflect.Type

func (CertificateMapOutput) MapIndex

func (CertificateMapOutput) ToCertificateMapOutput

func (o CertificateMapOutput) ToCertificateMapOutput() CertificateMapOutput

func (CertificateMapOutput) ToCertificateMapOutputWithContext

func (o CertificateMapOutput) ToCertificateMapOutputWithContext(ctx context.Context) CertificateMapOutput

type CertificateOutput

type CertificateOutput struct{ *pulumi.OutputState }

func (CertificateOutput) Akid

Authority Key Identifier.

func (CertificateOutput) Authority

func (o CertificateOutput) Authority() pulumi.StringOutput

func (CertificateOutput) Ca

func (CertificateOutput) CaCrlHost

func (o CertificateOutput) CaCrlHost() pulumi.StringOutput

func (CertificateOutput) CaFingerprint

func (o CertificateOutput) CaFingerprint() pulumi.StringOutput

func (CertificateOutput) CommonName

func (o CertificateOutput) CommonName() pulumi.StringOutput

Common Name (e.g. server FQDN or YOUR name).

func (CertificateOutput) CopyFrom

func (CertificateOutput) Country

Country Name (2 letter code).

func (CertificateOutput) Crl

func (CertificateOutput) DaysValid

func (o CertificateOutput) DaysValid() pulumi.IntOutput

Certificate lifetime.

func (CertificateOutput) DigestAlgorithm

func (o CertificateOutput) DigestAlgorithm() pulumi.BoolOutput

func (CertificateOutput) Dsa

func (CertificateOutput) ElementType

func (CertificateOutput) ElementType() reflect.Type

func (CertificateOutput) Expired

func (o CertificateOutput) Expired() pulumi.BoolOutput

Set to true if certificate is expired.

func (CertificateOutput) ExpiresAfter

func (o CertificateOutput) ExpiresAfter() pulumi.StringOutput

func (CertificateOutput) Fingerprint

func (o CertificateOutput) Fingerprint() pulumi.StringOutput

func (CertificateOutput) InvalidAfter

func (o CertificateOutput) InvalidAfter() pulumi.StringOutput

The date after which certificate wil be invalid.

func (CertificateOutput) InvalidBefore

func (o CertificateOutput) InvalidBefore() pulumi.StringOutput

The date before which certificate is invalid.

func (CertificateOutput) Issued

func (CertificateOutput) Issuer

func (CertificateOutput) KeySize

func (CertificateOutput) KeyType

func (CertificateOutput) KeyUsages

Detailed key usage descriptions can be found in RFC 5280.

func (CertificateOutput) Locality

Locality Name (eg, city).

func (CertificateOutput) Name

Name of the certificate. Name can be edited.

func (CertificateOutput) Organization

func (o CertificateOutput) Organization() pulumi.StringPtrOutput

Organizational Unit Name (eg, section)

func (CertificateOutput) PrivateKey

func (o CertificateOutput) PrivateKey() pulumi.BoolOutput

func (CertificateOutput) ReqFingerprint

func (o CertificateOutput) ReqFingerprint() pulumi.StringOutput

func (CertificateOutput) Revoked

func (CertificateOutput) ScepUrl

func (CertificateOutput) SerialNumber

func (o CertificateOutput) SerialNumber() pulumi.StringOutput

func (CertificateOutput) Signs

func (CertificateOutput) Skid

Subject Key Identifier.

func (CertificateOutput) SmartCardKey

func (o CertificateOutput) SmartCardKey() pulumi.StringOutput

func (CertificateOutput) State

State or Province Name (full name).

func (CertificateOutput) Status

Shows current status of scep client.

func (CertificateOutput) SubjectAltName

func (o CertificateOutput) SubjectAltName() pulumi.StringPtrOutput

SANs (subject alternative names).

func (CertificateOutput) ToCertificateOutput

func (o CertificateOutput) ToCertificateOutput() CertificateOutput

func (CertificateOutput) ToCertificateOutputWithContext

func (o CertificateOutput) ToCertificateOutputWithContext(ctx context.Context) CertificateOutput

func (CertificateOutput) Trusted

If set to yes certificate is included 'in trusted certificate chain'.

func (CertificateOutput) Unit

Organizational Unit Name (eg, section).

type CertificateSign

type CertificateSign struct {
	// Which CA to use if signing issued certificates.
	Ca *string `pulumi:"ca"`
	// CRL host if issuing CA certificate.
	CaCrlHost *string `pulumi:"caCrlHost"`
}

type CertificateSignArgs

type CertificateSignArgs struct {
	// Which CA to use if signing issued certificates.
	Ca pulumi.StringPtrInput `pulumi:"ca"`
	// CRL host if issuing CA certificate.
	CaCrlHost pulumi.StringPtrInput `pulumi:"caCrlHost"`
}

func (CertificateSignArgs) ElementType

func (CertificateSignArgs) ElementType() reflect.Type

func (CertificateSignArgs) ToCertificateSignOutput

func (i CertificateSignArgs) ToCertificateSignOutput() CertificateSignOutput

func (CertificateSignArgs) ToCertificateSignOutputWithContext

func (i CertificateSignArgs) ToCertificateSignOutputWithContext(ctx context.Context) CertificateSignOutput

type CertificateSignArray

type CertificateSignArray []CertificateSignInput

func (CertificateSignArray) ElementType

func (CertificateSignArray) ElementType() reflect.Type

func (CertificateSignArray) ToCertificateSignArrayOutput

func (i CertificateSignArray) ToCertificateSignArrayOutput() CertificateSignArrayOutput

func (CertificateSignArray) ToCertificateSignArrayOutputWithContext

func (i CertificateSignArray) ToCertificateSignArrayOutputWithContext(ctx context.Context) CertificateSignArrayOutput

type CertificateSignArrayInput

type CertificateSignArrayInput interface {
	pulumi.Input

	ToCertificateSignArrayOutput() CertificateSignArrayOutput
	ToCertificateSignArrayOutputWithContext(context.Context) CertificateSignArrayOutput
}

CertificateSignArrayInput is an input type that accepts CertificateSignArray and CertificateSignArrayOutput values. You can construct a concrete instance of `CertificateSignArrayInput` via:

CertificateSignArray{ CertificateSignArgs{...} }

type CertificateSignArrayOutput

type CertificateSignArrayOutput struct{ *pulumi.OutputState }

func (CertificateSignArrayOutput) ElementType

func (CertificateSignArrayOutput) ElementType() reflect.Type

func (CertificateSignArrayOutput) Index

func (CertificateSignArrayOutput) ToCertificateSignArrayOutput

func (o CertificateSignArrayOutput) ToCertificateSignArrayOutput() CertificateSignArrayOutput

func (CertificateSignArrayOutput) ToCertificateSignArrayOutputWithContext

func (o CertificateSignArrayOutput) ToCertificateSignArrayOutputWithContext(ctx context.Context) CertificateSignArrayOutput

type CertificateSignInput

type CertificateSignInput interface {
	pulumi.Input

	ToCertificateSignOutput() CertificateSignOutput
	ToCertificateSignOutputWithContext(context.Context) CertificateSignOutput
}

CertificateSignInput is an input type that accepts CertificateSignArgs and CertificateSignOutput values. You can construct a concrete instance of `CertificateSignInput` via:

CertificateSignArgs{...}

type CertificateSignOutput

type CertificateSignOutput struct{ *pulumi.OutputState }

func (CertificateSignOutput) Ca

Which CA to use if signing issued certificates.

func (CertificateSignOutput) CaCrlHost

CRL host if issuing CA certificate.

func (CertificateSignOutput) ElementType

func (CertificateSignOutput) ElementType() reflect.Type

func (CertificateSignOutput) ToCertificateSignOutput

func (o CertificateSignOutput) ToCertificateSignOutput() CertificateSignOutput

func (CertificateSignOutput) ToCertificateSignOutputWithContext

func (o CertificateSignOutput) ToCertificateSignOutputWithContext(ctx context.Context) CertificateSignOutput

type CertificateState

type CertificateState struct {

	// Authority Key Identifier.
	Akid          pulumi.StringPtrInput
	Authority     pulumi.StringPtrInput
	Ca            pulumi.StringPtrInput
	CaCrlHost     pulumi.StringPtrInput
	CaFingerprint pulumi.StringPtrInput
	// Common Name (e.g. server FQDN or YOUR name).
	CommonName pulumi.StringPtrInput
	CopyFrom   pulumi.StringPtrInput
	// Country Name (2 letter code).
	Country pulumi.StringPtrInput
	Crl     pulumi.StringPtrInput
	// Certificate lifetime.
	DaysValid       pulumi.IntPtrInput
	DigestAlgorithm pulumi.BoolPtrInput
	Dsa             pulumi.BoolPtrInput
	// Set to true if certificate is expired.
	Expired      pulumi.BoolPtrInput
	ExpiresAfter pulumi.StringPtrInput
	Fingerprint  pulumi.StringPtrInput
	// The date after which certificate wil be invalid.
	InvalidAfter pulumi.StringPtrInput
	// The date before which certificate is invalid.
	InvalidBefore pulumi.StringPtrInput
	Issued        pulumi.StringPtrInput
	Issuer        pulumi.StringPtrInput
	KeySize       pulumi.StringPtrInput
	KeyType       pulumi.StringPtrInput
	// Detailed key usage descriptions can be found in RFC 5280.
	KeyUsages pulumi.StringArrayInput
	// Locality Name (eg, city).
	Locality pulumi.StringPtrInput
	// Name of the certificate. Name can be edited.
	Name pulumi.StringPtrInput
	// Organizational Unit Name (eg, section)
	Organization   pulumi.StringPtrInput
	PrivateKey     pulumi.BoolPtrInput
	ReqFingerprint pulumi.StringPtrInput
	Revoked        pulumi.StringPtrInput
	ScepUrl        pulumi.StringPtrInput
	SerialNumber   pulumi.StringPtrInput
	Signs          CertificateSignArrayInput
	// Subject Key Identifier.
	Skid         pulumi.StringPtrInput
	SmartCardKey pulumi.StringPtrInput
	// State or Province Name (full name).
	State pulumi.StringPtrInput
	// Shows current status of scep client.
	Status pulumi.StringPtrInput
	// SANs (subject alternative names).
	SubjectAltName pulumi.StringPtrInput
	// If set to yes certificate is included 'in trusted certificate chain'.
	Trusted pulumi.BoolPtrInput
	// Organizational Unit Name (eg, section).
	Unit pulumi.StringPtrInput
	// contains filtered or unexported fields
}

func (CertificateState) ElementType

func (CertificateState) ElementType() reflect.Type

type Identity

type Identity struct {
	pulumi.CustomResourceState

	// Device name.
	Name pulumi.StringOutput `pulumi:"name"`
	// contains filtered or unexported fields
}

## # System.Identity (Resource)

***

#### This is an alias for backwards compatibility between plugin versions. Please see documentation for System.SystemIdentity

func GetIdentity

func GetIdentity(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *IdentityState, opts ...pulumi.ResourceOption) (*Identity, error)

GetIdentity gets an existing Identity resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewIdentity

func NewIdentity(ctx *pulumi.Context,
	name string, args *IdentityArgs, opts ...pulumi.ResourceOption) (*Identity, error)

NewIdentity registers a new resource with the given unique name, arguments, and options.

func (*Identity) ElementType

func (*Identity) ElementType() reflect.Type

func (*Identity) ToIdentityOutput

func (i *Identity) ToIdentityOutput() IdentityOutput

func (*Identity) ToIdentityOutputWithContext

func (i *Identity) ToIdentityOutputWithContext(ctx context.Context) IdentityOutput

type IdentityArgs

type IdentityArgs struct {

	// Device name.
	Name pulumi.StringPtrInput
	// contains filtered or unexported fields
}

The set of arguments for constructing a Identity resource.

func (IdentityArgs) ElementType

func (IdentityArgs) ElementType() reflect.Type

type IdentityArray

type IdentityArray []IdentityInput

func (IdentityArray) ElementType

func (IdentityArray) ElementType() reflect.Type

func (IdentityArray) ToIdentityArrayOutput

func (i IdentityArray) ToIdentityArrayOutput() IdentityArrayOutput

func (IdentityArray) ToIdentityArrayOutputWithContext

func (i IdentityArray) ToIdentityArrayOutputWithContext(ctx context.Context) IdentityArrayOutput

type IdentityArrayInput

type IdentityArrayInput interface {
	pulumi.Input

	ToIdentityArrayOutput() IdentityArrayOutput
	ToIdentityArrayOutputWithContext(context.Context) IdentityArrayOutput
}

IdentityArrayInput is an input type that accepts IdentityArray and IdentityArrayOutput values. You can construct a concrete instance of `IdentityArrayInput` via:

IdentityArray{ IdentityArgs{...} }

type IdentityArrayOutput

type IdentityArrayOutput struct{ *pulumi.OutputState }

func (IdentityArrayOutput) ElementType

func (IdentityArrayOutput) ElementType() reflect.Type

func (IdentityArrayOutput) Index

func (IdentityArrayOutput) ToIdentityArrayOutput

func (o IdentityArrayOutput) ToIdentityArrayOutput() IdentityArrayOutput

func (IdentityArrayOutput) ToIdentityArrayOutputWithContext

func (o IdentityArrayOutput) ToIdentityArrayOutputWithContext(ctx context.Context) IdentityArrayOutput

type IdentityInput

type IdentityInput interface {
	pulumi.Input

	ToIdentityOutput() IdentityOutput
	ToIdentityOutputWithContext(ctx context.Context) IdentityOutput
}

type IdentityMap

type IdentityMap map[string]IdentityInput

func (IdentityMap) ElementType

func (IdentityMap) ElementType() reflect.Type

func (IdentityMap) ToIdentityMapOutput

func (i IdentityMap) ToIdentityMapOutput() IdentityMapOutput

func (IdentityMap) ToIdentityMapOutputWithContext

func (i IdentityMap) ToIdentityMapOutputWithContext(ctx context.Context) IdentityMapOutput

type IdentityMapInput

type IdentityMapInput interface {
	pulumi.Input

	ToIdentityMapOutput() IdentityMapOutput
	ToIdentityMapOutputWithContext(context.Context) IdentityMapOutput
}

IdentityMapInput is an input type that accepts IdentityMap and IdentityMapOutput values. You can construct a concrete instance of `IdentityMapInput` via:

IdentityMap{ "key": IdentityArgs{...} }

type IdentityMapOutput

type IdentityMapOutput struct{ *pulumi.OutputState }

func (IdentityMapOutput) ElementType

func (IdentityMapOutput) ElementType() reflect.Type

func (IdentityMapOutput) MapIndex

func (IdentityMapOutput) ToIdentityMapOutput

func (o IdentityMapOutput) ToIdentityMapOutput() IdentityMapOutput

func (IdentityMapOutput) ToIdentityMapOutputWithContext

func (o IdentityMapOutput) ToIdentityMapOutputWithContext(ctx context.Context) IdentityMapOutput

type IdentityOutput

type IdentityOutput struct{ *pulumi.OutputState }

func (IdentityOutput) ElementType

func (IdentityOutput) ElementType() reflect.Type

func (IdentityOutput) Name

Device name.

func (IdentityOutput) ToIdentityOutput

func (o IdentityOutput) ToIdentityOutput() IdentityOutput

func (IdentityOutput) ToIdentityOutputWithContext

func (o IdentityOutput) ToIdentityOutputWithContext(ctx context.Context) IdentityOutput

type IdentityState

type IdentityState struct {

	// Device name.
	Name pulumi.StringPtrInput
	// contains filtered or unexported fields
}

func (IdentityState) ElementType

func (IdentityState) ElementType() reflect.Type

type Scheduler

type Scheduler struct {
	pulumi.CustomResourceState

	Comment  pulumi.StringPtrOutput `pulumi:"comment"`
	Disabled pulumi.BoolPtrOutput   `pulumi:"disabled"`
	// Interval between two script executions, if time interval is set to zero, the script is only executed at its start time,
	// otherwise it is executed repeatedly at the time interval is specified.
	Interval pulumi.StringOutput `pulumi:"interval"`
	// Changing the name of this resource will force it to be recreated. > The links of other configuration properties to this
	// resource may be lost! > Changing the name of the resource outside of a Terraform will result in a loss of control
	// integrity for that resource!
	Name    pulumi.StringOutput `pulumi:"name"`
	NextRun pulumi.StringOutput `pulumi:"nextRun"`
	// Name of the script to execute. It must be presented at /system script.
	OnEvent pulumi.StringOutput `pulumi:"onEvent"`
	Owner   pulumi.StringOutput `pulumi:"owner"`
	// List of applicable policies: * dude - Policy that grants rights to log in to dude server. * ftp - Policy that grants
	// full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be
	// used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy
	// that grants user management rights. Should be used together with the write policy. Allows also to see global variables
	// created by other users (requires also 'test' policy). * read - Policy that grants read access to the router's
	// configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot -
	// Policy that allows rebooting the router. * romon - Policy that grants rights to connect to RoMon server. * sensitive -
	// Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not
	// displayed. * sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run
	// ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write
	// access to the router's configuration, except for user management. This policy does not allow to read the configuration,
	// so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
	Policies pulumi.StringArrayOutput `pulumi:"policies"`
	// This counter is incremented each time the script is executed.
	RunCount pulumi.StringOutput `pulumi:"runCount"`
	// Date of the first script execution.
	StartDate pulumi.StringOutput `pulumi:"startDate"`
	// Time of the first script execution. If scheduler item has start-time set to startup, it behaves as if start-time and
	// start-date were set to time 3 seconds after console starts up. It means that all scripts having start-time is startup
	// and interval is 0 will be executed once each time router boots. If the interval is set to value other than 0 scheduler
	// will not run at startup.
	StartTime pulumi.StringOutput `pulumi:"startTime"`
	// contains filtered or unexported fields
}

## # System.Scheduler (Resource)

***

#### This is an alias for backwards compatibility between plugin versions. Please see documentation for System.SystemScheduler

func GetScheduler

func GetScheduler(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *SchedulerState, opts ...pulumi.ResourceOption) (*Scheduler, error)

GetScheduler gets an existing Scheduler resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewScheduler

func NewScheduler(ctx *pulumi.Context,
	name string, args *SchedulerArgs, opts ...pulumi.ResourceOption) (*Scheduler, error)

NewScheduler registers a new resource with the given unique name, arguments, and options.

func (*Scheduler) ElementType

func (*Scheduler) ElementType() reflect.Type

func (*Scheduler) ToSchedulerOutput

func (i *Scheduler) ToSchedulerOutput() SchedulerOutput

func (*Scheduler) ToSchedulerOutputWithContext

func (i *Scheduler) ToSchedulerOutputWithContext(ctx context.Context) SchedulerOutput

type SchedulerArgs

type SchedulerArgs struct {
	Comment  pulumi.StringPtrInput
	Disabled pulumi.BoolPtrInput
	// Interval between two script executions, if time interval is set to zero, the script is only executed at its start time,
	// otherwise it is executed repeatedly at the time interval is specified.
	Interval pulumi.StringPtrInput
	// Changing the name of this resource will force it to be recreated. > The links of other configuration properties to this
	// resource may be lost! > Changing the name of the resource outside of a Terraform will result in a loss of control
	// integrity for that resource!
	Name pulumi.StringPtrInput
	// Name of the script to execute. It must be presented at /system script.
	OnEvent pulumi.StringInput
	// List of applicable policies: * dude - Policy that grants rights to log in to dude server. * ftp - Policy that grants
	// full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be
	// used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy
	// that grants user management rights. Should be used together with the write policy. Allows also to see global variables
	// created by other users (requires also 'test' policy). * read - Policy that grants read access to the router's
	// configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot -
	// Policy that allows rebooting the router. * romon - Policy that grants rights to connect to RoMon server. * sensitive -
	// Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not
	// displayed. * sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run
	// ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write
	// access to the router's configuration, except for user management. This policy does not allow to read the configuration,
	// so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
	Policies pulumi.StringArrayInput
	// Date of the first script execution.
	StartDate pulumi.StringPtrInput
	// Time of the first script execution. If scheduler item has start-time set to startup, it behaves as if start-time and
	// start-date were set to time 3 seconds after console starts up. It means that all scripts having start-time is startup
	// and interval is 0 will be executed once each time router boots. If the interval is set to value other than 0 scheduler
	// will not run at startup.
	StartTime pulumi.StringPtrInput
	// contains filtered or unexported fields
}

The set of arguments for constructing a Scheduler resource.

func (SchedulerArgs) ElementType

func (SchedulerArgs) ElementType() reflect.Type

type SchedulerArray

type SchedulerArray []SchedulerInput

func (SchedulerArray) ElementType

func (SchedulerArray) ElementType() reflect.Type

func (SchedulerArray) ToSchedulerArrayOutput

func (i SchedulerArray) ToSchedulerArrayOutput() SchedulerArrayOutput

func (SchedulerArray) ToSchedulerArrayOutputWithContext

func (i SchedulerArray) ToSchedulerArrayOutputWithContext(ctx context.Context) SchedulerArrayOutput

type SchedulerArrayInput

type SchedulerArrayInput interface {
	pulumi.Input

	ToSchedulerArrayOutput() SchedulerArrayOutput
	ToSchedulerArrayOutputWithContext(context.Context) SchedulerArrayOutput
}

SchedulerArrayInput is an input type that accepts SchedulerArray and SchedulerArrayOutput values. You can construct a concrete instance of `SchedulerArrayInput` via:

SchedulerArray{ SchedulerArgs{...} }

type SchedulerArrayOutput

type SchedulerArrayOutput struct{ *pulumi.OutputState }

func (SchedulerArrayOutput) ElementType

func (SchedulerArrayOutput) ElementType() reflect.Type

func (SchedulerArrayOutput) Index

func (SchedulerArrayOutput) ToSchedulerArrayOutput

func (o SchedulerArrayOutput) ToSchedulerArrayOutput() SchedulerArrayOutput

func (SchedulerArrayOutput) ToSchedulerArrayOutputWithContext

func (o SchedulerArrayOutput) ToSchedulerArrayOutputWithContext(ctx context.Context) SchedulerArrayOutput

type SchedulerInput

type SchedulerInput interface {
	pulumi.Input

	ToSchedulerOutput() SchedulerOutput
	ToSchedulerOutputWithContext(ctx context.Context) SchedulerOutput
}

type SchedulerMap

type SchedulerMap map[string]SchedulerInput

func (SchedulerMap) ElementType

func (SchedulerMap) ElementType() reflect.Type

func (SchedulerMap) ToSchedulerMapOutput

func (i SchedulerMap) ToSchedulerMapOutput() SchedulerMapOutput

func (SchedulerMap) ToSchedulerMapOutputWithContext

func (i SchedulerMap) ToSchedulerMapOutputWithContext(ctx context.Context) SchedulerMapOutput

type SchedulerMapInput

type SchedulerMapInput interface {
	pulumi.Input

	ToSchedulerMapOutput() SchedulerMapOutput
	ToSchedulerMapOutputWithContext(context.Context) SchedulerMapOutput
}

SchedulerMapInput is an input type that accepts SchedulerMap and SchedulerMapOutput values. You can construct a concrete instance of `SchedulerMapInput` via:

SchedulerMap{ "key": SchedulerArgs{...} }

type SchedulerMapOutput

type SchedulerMapOutput struct{ *pulumi.OutputState }

func (SchedulerMapOutput) ElementType

func (SchedulerMapOutput) ElementType() reflect.Type

func (SchedulerMapOutput) MapIndex

func (SchedulerMapOutput) ToSchedulerMapOutput

func (o SchedulerMapOutput) ToSchedulerMapOutput() SchedulerMapOutput

func (SchedulerMapOutput) ToSchedulerMapOutputWithContext

func (o SchedulerMapOutput) ToSchedulerMapOutputWithContext(ctx context.Context) SchedulerMapOutput

type SchedulerOutput

type SchedulerOutput struct{ *pulumi.OutputState }

func (SchedulerOutput) Comment

func (SchedulerOutput) Disabled

func (o SchedulerOutput) Disabled() pulumi.BoolPtrOutput

func (SchedulerOutput) ElementType

func (SchedulerOutput) ElementType() reflect.Type

func (SchedulerOutput) Interval

func (o SchedulerOutput) Interval() pulumi.StringOutput

Interval between two script executions, if time interval is set to zero, the script is only executed at its start time, otherwise it is executed repeatedly at the time interval is specified.

func (SchedulerOutput) Name

Changing the name of this resource will force it to be recreated. > The links of other configuration properties to this resource may be lost! > Changing the name of the resource outside of a Terraform will result in a loss of control integrity for that resource!

func (SchedulerOutput) NextRun

func (o SchedulerOutput) NextRun() pulumi.StringOutput

func (SchedulerOutput) OnEvent

func (o SchedulerOutput) OnEvent() pulumi.StringOutput

Name of the script to execute. It must be presented at /system script.

func (SchedulerOutput) Owner

func (SchedulerOutput) Policies

List of applicable policies: * dude - Policy that grants rights to log in to dude server. * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read - Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * romon - Policy that grants rights to connect to RoMon server. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed. * sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]

func (SchedulerOutput) RunCount

func (o SchedulerOutput) RunCount() pulumi.StringOutput

This counter is incremented each time the script is executed.

func (SchedulerOutput) StartDate

func (o SchedulerOutput) StartDate() pulumi.StringOutput

Date of the first script execution.

func (SchedulerOutput) StartTime

func (o SchedulerOutput) StartTime() pulumi.StringOutput

Time of the first script execution. If scheduler item has start-time set to startup, it behaves as if start-time and start-date were set to time 3 seconds after console starts up. It means that all scripts having start-time is startup and interval is 0 will be executed once each time router boots. If the interval is set to value other than 0 scheduler will not run at startup.

func (SchedulerOutput) ToSchedulerOutput

func (o SchedulerOutput) ToSchedulerOutput() SchedulerOutput

func (SchedulerOutput) ToSchedulerOutputWithContext

func (o SchedulerOutput) ToSchedulerOutputWithContext(ctx context.Context) SchedulerOutput

type SchedulerState

type SchedulerState struct {
	Comment  pulumi.StringPtrInput
	Disabled pulumi.BoolPtrInput
	// Interval between two script executions, if time interval is set to zero, the script is only executed at its start time,
	// otherwise it is executed repeatedly at the time interval is specified.
	Interval pulumi.StringPtrInput
	// Changing the name of this resource will force it to be recreated. > The links of other configuration properties to this
	// resource may be lost! > Changing the name of the resource outside of a Terraform will result in a loss of control
	// integrity for that resource!
	Name    pulumi.StringPtrInput
	NextRun pulumi.StringPtrInput
	// Name of the script to execute. It must be presented at /system script.
	OnEvent pulumi.StringPtrInput
	Owner   pulumi.StringPtrInput
	// List of applicable policies: * dude - Policy that grants rights to log in to dude server. * ftp - Policy that grants
	// full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be
	// used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy
	// that grants user management rights. Should be used together with the write policy. Allows also to see global variables
	// created by other users (requires also 'test' policy). * read - Policy that grants read access to the router's
	// configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot -
	// Policy that allows rebooting the router. * romon - Policy that grants rights to connect to RoMon server. * sensitive -
	// Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not
	// displayed. * sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run
	// ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write
	// access to the router's configuration, except for user management. This policy does not allow to read the configuration,
	// so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
	Policies pulumi.StringArrayInput
	// This counter is incremented each time the script is executed.
	RunCount pulumi.StringPtrInput
	// Date of the first script execution.
	StartDate pulumi.StringPtrInput
	// Time of the first script execution. If scheduler item has start-time set to startup, it behaves as if start-time and
	// start-date were set to time 3 seconds after console starts up. It means that all scripts having start-time is startup
	// and interval is 0 will be executed once each time router boots. If the interval is set to value other than 0 scheduler
	// will not run at startup.
	StartTime pulumi.StringPtrInput
	// contains filtered or unexported fields
}

func (SchedulerState) ElementType

func (SchedulerState) ElementType() reflect.Type

type SystemIdentity

type SystemIdentity struct {
	pulumi.CustomResourceState

	// Device name.
	Name pulumi.StringOutput `pulumi:"name"`
	// contains filtered or unexported fields
}

## Example Usage

```go package main

import (

"github.com/pulumi/pulumi-routeros/sdk/go/routeros/System"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := System.NewSystemIdentity(ctx, "identity", nil)
		if err != nil {
			return err
		}
		return nil
	})
}

```

## Import

```sh

$ pulumi import routeros:System/systemIdentity:SystemIdentity identity .

```

func GetSystemIdentity

func GetSystemIdentity(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *SystemIdentityState, opts ...pulumi.ResourceOption) (*SystemIdentity, error)

GetSystemIdentity gets an existing SystemIdentity resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewSystemIdentity

func NewSystemIdentity(ctx *pulumi.Context,
	name string, args *SystemIdentityArgs, opts ...pulumi.ResourceOption) (*SystemIdentity, error)

NewSystemIdentity registers a new resource with the given unique name, arguments, and options.

func (*SystemIdentity) ElementType

func (*SystemIdentity) ElementType() reflect.Type

func (*SystemIdentity) ToSystemIdentityOutput

func (i *SystemIdentity) ToSystemIdentityOutput() SystemIdentityOutput

func (*SystemIdentity) ToSystemIdentityOutputWithContext

func (i *SystemIdentity) ToSystemIdentityOutputWithContext(ctx context.Context) SystemIdentityOutput

type SystemIdentityArgs

type SystemIdentityArgs struct {

	// Device name.
	Name pulumi.StringPtrInput
	// contains filtered or unexported fields
}

The set of arguments for constructing a SystemIdentity resource.

func (SystemIdentityArgs) ElementType

func (SystemIdentityArgs) ElementType() reflect.Type

type SystemIdentityArray

type SystemIdentityArray []SystemIdentityInput

func (SystemIdentityArray) ElementType

func (SystemIdentityArray) ElementType() reflect.Type

func (SystemIdentityArray) ToSystemIdentityArrayOutput

func (i SystemIdentityArray) ToSystemIdentityArrayOutput() SystemIdentityArrayOutput

func (SystemIdentityArray) ToSystemIdentityArrayOutputWithContext

func (i SystemIdentityArray) ToSystemIdentityArrayOutputWithContext(ctx context.Context) SystemIdentityArrayOutput

type SystemIdentityArrayInput

type SystemIdentityArrayInput interface {
	pulumi.Input

	ToSystemIdentityArrayOutput() SystemIdentityArrayOutput
	ToSystemIdentityArrayOutputWithContext(context.Context) SystemIdentityArrayOutput
}

SystemIdentityArrayInput is an input type that accepts SystemIdentityArray and SystemIdentityArrayOutput values. You can construct a concrete instance of `SystemIdentityArrayInput` via:

SystemIdentityArray{ SystemIdentityArgs{...} }

type SystemIdentityArrayOutput

type SystemIdentityArrayOutput struct{ *pulumi.OutputState }

func (SystemIdentityArrayOutput) ElementType

func (SystemIdentityArrayOutput) ElementType() reflect.Type

func (SystemIdentityArrayOutput) Index

func (SystemIdentityArrayOutput) ToSystemIdentityArrayOutput

func (o SystemIdentityArrayOutput) ToSystemIdentityArrayOutput() SystemIdentityArrayOutput

func (SystemIdentityArrayOutput) ToSystemIdentityArrayOutputWithContext

func (o SystemIdentityArrayOutput) ToSystemIdentityArrayOutputWithContext(ctx context.Context) SystemIdentityArrayOutput

type SystemIdentityInput

type SystemIdentityInput interface {
	pulumi.Input

	ToSystemIdentityOutput() SystemIdentityOutput
	ToSystemIdentityOutputWithContext(ctx context.Context) SystemIdentityOutput
}

type SystemIdentityMap

type SystemIdentityMap map[string]SystemIdentityInput

func (SystemIdentityMap) ElementType

func (SystemIdentityMap) ElementType() reflect.Type

func (SystemIdentityMap) ToSystemIdentityMapOutput

func (i SystemIdentityMap) ToSystemIdentityMapOutput() SystemIdentityMapOutput

func (SystemIdentityMap) ToSystemIdentityMapOutputWithContext

func (i SystemIdentityMap) ToSystemIdentityMapOutputWithContext(ctx context.Context) SystemIdentityMapOutput

type SystemIdentityMapInput

type SystemIdentityMapInput interface {
	pulumi.Input

	ToSystemIdentityMapOutput() SystemIdentityMapOutput
	ToSystemIdentityMapOutputWithContext(context.Context) SystemIdentityMapOutput
}

SystemIdentityMapInput is an input type that accepts SystemIdentityMap and SystemIdentityMapOutput values. You can construct a concrete instance of `SystemIdentityMapInput` via:

SystemIdentityMap{ "key": SystemIdentityArgs{...} }

type SystemIdentityMapOutput

type SystemIdentityMapOutput struct{ *pulumi.OutputState }

func (SystemIdentityMapOutput) ElementType

func (SystemIdentityMapOutput) ElementType() reflect.Type

func (SystemIdentityMapOutput) MapIndex

func (SystemIdentityMapOutput) ToSystemIdentityMapOutput

func (o SystemIdentityMapOutput) ToSystemIdentityMapOutput() SystemIdentityMapOutput

func (SystemIdentityMapOutput) ToSystemIdentityMapOutputWithContext

func (o SystemIdentityMapOutput) ToSystemIdentityMapOutputWithContext(ctx context.Context) SystemIdentityMapOutput

type SystemIdentityOutput

type SystemIdentityOutput struct{ *pulumi.OutputState }

func (SystemIdentityOutput) ElementType

func (SystemIdentityOutput) ElementType() reflect.Type

func (SystemIdentityOutput) Name

Device name.

func (SystemIdentityOutput) ToSystemIdentityOutput

func (o SystemIdentityOutput) ToSystemIdentityOutput() SystemIdentityOutput

func (SystemIdentityOutput) ToSystemIdentityOutputWithContext

func (o SystemIdentityOutput) ToSystemIdentityOutputWithContext(ctx context.Context) SystemIdentityOutput

type SystemIdentityState

type SystemIdentityState struct {

	// Device name.
	Name pulumi.StringPtrInput
	// contains filtered or unexported fields
}

func (SystemIdentityState) ElementType

func (SystemIdentityState) ElementType() reflect.Type

type SystemScheduler

type SystemScheduler struct {
	pulumi.CustomResourceState

	Comment  pulumi.StringPtrOutput `pulumi:"comment"`
	Disabled pulumi.BoolPtrOutput   `pulumi:"disabled"`
	// Interval between two script executions, if time interval is set to zero, the script is only executed at its start time,
	// otherwise it is executed repeatedly at the time interval is specified.
	Interval pulumi.StringOutput `pulumi:"interval"`
	// Changing the name of this resource will force it to be recreated. > The links of other configuration properties to this
	// resource may be lost! > Changing the name of the resource outside of a Terraform will result in a loss of control
	// integrity for that resource!
	Name    pulumi.StringOutput `pulumi:"name"`
	NextRun pulumi.StringOutput `pulumi:"nextRun"`
	// Name of the script to execute. It must be presented at /system script.
	OnEvent pulumi.StringOutput `pulumi:"onEvent"`
	Owner   pulumi.StringOutput `pulumi:"owner"`
	// List of applicable policies: * dude - Policy that grants rights to log in to dude server. * ftp - Policy that grants
	// full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be
	// used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy
	// that grants user management rights. Should be used together with the write policy. Allows also to see global variables
	// created by other users (requires also 'test' policy). * read - Policy that grants read access to the router's
	// configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot -
	// Policy that allows rebooting the router. * romon - Policy that grants rights to connect to RoMon server. * sensitive -
	// Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not
	// displayed. * sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run
	// ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write
	// access to the router's configuration, except for user management. This policy does not allow to read the configuration,
	// so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
	Policies pulumi.StringArrayOutput `pulumi:"policies"`
	// This counter is incremented each time the script is executed.
	RunCount pulumi.StringOutput `pulumi:"runCount"`
	// Date of the first script execution.
	StartDate pulumi.StringOutput `pulumi:"startDate"`
	// Time of the first script execution. If scheduler item has start-time set to startup, it behaves as if start-time and
	// start-date were set to time 3 seconds after console starts up. It means that all scripts having start-time is startup
	// and interval is 0 will be executed once each time router boots. If the interval is set to value other than 0 scheduler
	// will not run at startup.
	StartTime pulumi.StringOutput `pulumi:"startTime"`
	// contains filtered or unexported fields
}

## Example Usage

```go package main

import (

"github.com/pulumi/pulumi-routeros/sdk/go/routeros/System"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := System.NewSystemScheduler(ctx, "schedule1", &System.SystemSchedulerArgs{
			OnEvent: pulumi.String("script name"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}

```

## Import

#The ID can be found via API or the terminal #The command for the terminal is -> :put [/system/scheduler get [print show-ids]]

```sh

$ pulumi import routeros:System/systemScheduler:SystemScheduler schedule1 "*0"

```

func GetSystemScheduler

func GetSystemScheduler(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *SystemSchedulerState, opts ...pulumi.ResourceOption) (*SystemScheduler, error)

GetSystemScheduler gets an existing SystemScheduler resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewSystemScheduler

func NewSystemScheduler(ctx *pulumi.Context,
	name string, args *SystemSchedulerArgs, opts ...pulumi.ResourceOption) (*SystemScheduler, error)

NewSystemScheduler registers a new resource with the given unique name, arguments, and options.

func (*SystemScheduler) ElementType

func (*SystemScheduler) ElementType() reflect.Type

func (*SystemScheduler) ToSystemSchedulerOutput

func (i *SystemScheduler) ToSystemSchedulerOutput() SystemSchedulerOutput

func (*SystemScheduler) ToSystemSchedulerOutputWithContext

func (i *SystemScheduler) ToSystemSchedulerOutputWithContext(ctx context.Context) SystemSchedulerOutput

type SystemSchedulerArgs

type SystemSchedulerArgs struct {
	Comment  pulumi.StringPtrInput
	Disabled pulumi.BoolPtrInput
	// Interval between two script executions, if time interval is set to zero, the script is only executed at its start time,
	// otherwise it is executed repeatedly at the time interval is specified.
	Interval pulumi.StringPtrInput
	// Changing the name of this resource will force it to be recreated. > The links of other configuration properties to this
	// resource may be lost! > Changing the name of the resource outside of a Terraform will result in a loss of control
	// integrity for that resource!
	Name pulumi.StringPtrInput
	// Name of the script to execute. It must be presented at /system script.
	OnEvent pulumi.StringInput
	// List of applicable policies: * dude - Policy that grants rights to log in to dude server. * ftp - Policy that grants
	// full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be
	// used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy
	// that grants user management rights. Should be used together with the write policy. Allows also to see global variables
	// created by other users (requires also 'test' policy). * read - Policy that grants read access to the router's
	// configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot -
	// Policy that allows rebooting the router. * romon - Policy that grants rights to connect to RoMon server. * sensitive -
	// Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not
	// displayed. * sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run
	// ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write
	// access to the router's configuration, except for user management. This policy does not allow to read the configuration,
	// so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
	Policies pulumi.StringArrayInput
	// Date of the first script execution.
	StartDate pulumi.StringPtrInput
	// Time of the first script execution. If scheduler item has start-time set to startup, it behaves as if start-time and
	// start-date were set to time 3 seconds after console starts up. It means that all scripts having start-time is startup
	// and interval is 0 will be executed once each time router boots. If the interval is set to value other than 0 scheduler
	// will not run at startup.
	StartTime pulumi.StringPtrInput
	// contains filtered or unexported fields
}

The set of arguments for constructing a SystemScheduler resource.

func (SystemSchedulerArgs) ElementType

func (SystemSchedulerArgs) ElementType() reflect.Type

type SystemSchedulerArray

type SystemSchedulerArray []SystemSchedulerInput

func (SystemSchedulerArray) ElementType

func (SystemSchedulerArray) ElementType() reflect.Type

func (SystemSchedulerArray) ToSystemSchedulerArrayOutput

func (i SystemSchedulerArray) ToSystemSchedulerArrayOutput() SystemSchedulerArrayOutput

func (SystemSchedulerArray) ToSystemSchedulerArrayOutputWithContext

func (i SystemSchedulerArray) ToSystemSchedulerArrayOutputWithContext(ctx context.Context) SystemSchedulerArrayOutput

type SystemSchedulerArrayInput

type SystemSchedulerArrayInput interface {
	pulumi.Input

	ToSystemSchedulerArrayOutput() SystemSchedulerArrayOutput
	ToSystemSchedulerArrayOutputWithContext(context.Context) SystemSchedulerArrayOutput
}

SystemSchedulerArrayInput is an input type that accepts SystemSchedulerArray and SystemSchedulerArrayOutput values. You can construct a concrete instance of `SystemSchedulerArrayInput` via:

SystemSchedulerArray{ SystemSchedulerArgs{...} }

type SystemSchedulerArrayOutput

type SystemSchedulerArrayOutput struct{ *pulumi.OutputState }

func (SystemSchedulerArrayOutput) ElementType

func (SystemSchedulerArrayOutput) ElementType() reflect.Type

func (SystemSchedulerArrayOutput) Index

func (SystemSchedulerArrayOutput) ToSystemSchedulerArrayOutput

func (o SystemSchedulerArrayOutput) ToSystemSchedulerArrayOutput() SystemSchedulerArrayOutput

func (SystemSchedulerArrayOutput) ToSystemSchedulerArrayOutputWithContext

func (o SystemSchedulerArrayOutput) ToSystemSchedulerArrayOutputWithContext(ctx context.Context) SystemSchedulerArrayOutput

type SystemSchedulerInput

type SystemSchedulerInput interface {
	pulumi.Input

	ToSystemSchedulerOutput() SystemSchedulerOutput
	ToSystemSchedulerOutputWithContext(ctx context.Context) SystemSchedulerOutput
}

type SystemSchedulerMap

type SystemSchedulerMap map[string]SystemSchedulerInput

func (SystemSchedulerMap) ElementType

func (SystemSchedulerMap) ElementType() reflect.Type

func (SystemSchedulerMap) ToSystemSchedulerMapOutput

func (i SystemSchedulerMap) ToSystemSchedulerMapOutput() SystemSchedulerMapOutput

func (SystemSchedulerMap) ToSystemSchedulerMapOutputWithContext

func (i SystemSchedulerMap) ToSystemSchedulerMapOutputWithContext(ctx context.Context) SystemSchedulerMapOutput

type SystemSchedulerMapInput

type SystemSchedulerMapInput interface {
	pulumi.Input

	ToSystemSchedulerMapOutput() SystemSchedulerMapOutput
	ToSystemSchedulerMapOutputWithContext(context.Context) SystemSchedulerMapOutput
}

SystemSchedulerMapInput is an input type that accepts SystemSchedulerMap and SystemSchedulerMapOutput values. You can construct a concrete instance of `SystemSchedulerMapInput` via:

SystemSchedulerMap{ "key": SystemSchedulerArgs{...} }

type SystemSchedulerMapOutput

type SystemSchedulerMapOutput struct{ *pulumi.OutputState }

func (SystemSchedulerMapOutput) ElementType

func (SystemSchedulerMapOutput) ElementType() reflect.Type

func (SystemSchedulerMapOutput) MapIndex

func (SystemSchedulerMapOutput) ToSystemSchedulerMapOutput

func (o SystemSchedulerMapOutput) ToSystemSchedulerMapOutput() SystemSchedulerMapOutput

func (SystemSchedulerMapOutput) ToSystemSchedulerMapOutputWithContext

func (o SystemSchedulerMapOutput) ToSystemSchedulerMapOutputWithContext(ctx context.Context) SystemSchedulerMapOutput

type SystemSchedulerOutput

type SystemSchedulerOutput struct{ *pulumi.OutputState }

func (SystemSchedulerOutput) Comment

func (SystemSchedulerOutput) Disabled

func (SystemSchedulerOutput) ElementType

func (SystemSchedulerOutput) ElementType() reflect.Type

func (SystemSchedulerOutput) Interval

Interval between two script executions, if time interval is set to zero, the script is only executed at its start time, otherwise it is executed repeatedly at the time interval is specified.

func (SystemSchedulerOutput) Name

Changing the name of this resource will force it to be recreated. > The links of other configuration properties to this resource may be lost! > Changing the name of the resource outside of a Terraform will result in a loss of control integrity for that resource!

func (SystemSchedulerOutput) NextRun

func (SystemSchedulerOutput) OnEvent

Name of the script to execute. It must be presented at /system script.

func (SystemSchedulerOutput) Owner

func (SystemSchedulerOutput) Policies

List of applicable policies: * dude - Policy that grants rights to log in to dude server. * ftp - Policy that grants full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy that grants user management rights. Should be used together with the write policy. Allows also to see global variables created by other users (requires also 'test' policy). * read - Policy that grants read access to the router's configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot - Policy that allows rebooting the router. * romon - Policy that grants rights to connect to RoMon server. * sensitive - Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not displayed. * sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write access to the router's configuration, except for user management. This policy does not allow to read the configuration, so make sure to enable read policy as well. policy = ["ftp", "read", "write"]

func (SystemSchedulerOutput) RunCount

This counter is incremented each time the script is executed.

func (SystemSchedulerOutput) StartDate

Date of the first script execution.

func (SystemSchedulerOutput) StartTime

Time of the first script execution. If scheduler item has start-time set to startup, it behaves as if start-time and start-date were set to time 3 seconds after console starts up. It means that all scripts having start-time is startup and interval is 0 will be executed once each time router boots. If the interval is set to value other than 0 scheduler will not run at startup.

func (SystemSchedulerOutput) ToSystemSchedulerOutput

func (o SystemSchedulerOutput) ToSystemSchedulerOutput() SystemSchedulerOutput

func (SystemSchedulerOutput) ToSystemSchedulerOutputWithContext

func (o SystemSchedulerOutput) ToSystemSchedulerOutputWithContext(ctx context.Context) SystemSchedulerOutput

type SystemSchedulerState

type SystemSchedulerState struct {
	Comment  pulumi.StringPtrInput
	Disabled pulumi.BoolPtrInput
	// Interval between two script executions, if time interval is set to zero, the script is only executed at its start time,
	// otherwise it is executed repeatedly at the time interval is specified.
	Interval pulumi.StringPtrInput
	// Changing the name of this resource will force it to be recreated. > The links of other configuration properties to this
	// resource may be lost! > Changing the name of the resource outside of a Terraform will result in a loss of control
	// integrity for that resource!
	Name    pulumi.StringPtrInput
	NextRun pulumi.StringPtrInput
	// Name of the script to execute. It must be presented at /system script.
	OnEvent pulumi.StringPtrInput
	Owner   pulumi.StringPtrInput
	// List of applicable policies: * dude - Policy that grants rights to log in to dude server. * ftp - Policy that grants
	// full rights to log in remotely via FTP, to read/write/erase files and to transfer files from/to the router. Should be
	// used together with read/write policies. * password - Policy that grants rights to change the password. * policy - Policy
	// that grants user management rights. Should be used together with the write policy. Allows also to see global variables
	// created by other users (requires also 'test' policy). * read - Policy that grants read access to the router's
	// configuration. All console commands that do not alter router's configuration are allowed. Doesn't affect FTP. * reboot -
	// Policy that allows rebooting the router. * romon - Policy that grants rights to connect to RoMon server. * sensitive -
	// Policy that grants rights to change "hide sensitive" option, if this policy is disabled sensitive information is not
	// displayed. * sniff - Policy that grants rights to use packet sniffer tool. * test - Policy that grants rights to run
	// ping, traceroute, bandwidth-test, wireless scan, snooper, and other test commands. * write - Policy that grants write
	// access to the router's configuration, except for user management. This policy does not allow to read the configuration,
	// so make sure to enable read policy as well. policy = ["ftp", "read", "write"]
	Policies pulumi.StringArrayInput
	// This counter is incremented each time the script is executed.
	RunCount pulumi.StringPtrInput
	// Date of the first script execution.
	StartDate pulumi.StringPtrInput
	// Time of the first script execution. If scheduler item has start-time set to startup, it behaves as if start-time and
	// start-date were set to time 3 seconds after console starts up. It means that all scripts having start-time is startup
	// and interval is 0 will be executed once each time router boots. If the interval is set to value other than 0 scheduler
	// will not run at startup.
	StartTime pulumi.StringPtrInput
	// contains filtered or unexported fields
}

func (SystemSchedulerState) ElementType

func (SystemSchedulerState) ElementType() reflect.Type

type User

type User struct {
	pulumi.CustomResourceState

	// Host or network address from which the user is allowed to log in.
	Address  pulumi.StringPtrOutput `pulumi:"address"`
	Comment  pulumi.StringPtrOutput `pulumi:"comment"`
	Disabled pulumi.BoolPtrOutput   `pulumi:"disabled"`
	// Password expired.
	Expired pulumi.BoolOutput `pulumi:"expired"`
	// Name of the group the user belongs to.
	Group pulumi.StringOutput `pulumi:"group"`
	// Read-only field. Last time and date when a user logged in.
	LastLoggedIn pulumi.StringOutput `pulumi:"lastLoggedIn"`
	// User name. Although it must start with an alphanumeric character, it may contain '*', '_', '.' and '@' symbols.
	Name pulumi.StringOutput `pulumi:"name"`
	// User  password. If not specified, it is left blank (hit [Enter] when logging  in). It conforms to standard Unix characteristics of passwords and may  contain letters, digits, '*' and '_' symbols.
	Password pulumi.StringPtrOutput `pulumi:"password"`
	// contains filtered or unexported fields
}

## Example Usage

```go package main

import (

"github.com/pulumi/pulumi-routeros/sdk/go/routeros/System"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"

)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := System.NewUser(ctx, "test", &System.UserArgs{
			Address:  pulumi.String("0.0.0.0/0"),
			Comment:  pulumi.String("Test User"),
			Group:    pulumi.String("read"),
			Password: pulumi.String("secret"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}

```

## Import

#The ID can be found via API or the terminal #The command for the terminal is -> :put [/user get [print show-ids]]

```sh

$ pulumi import routeros:System/user:User test *1

```

func GetUser

func GetUser(ctx *pulumi.Context,
	name string, id pulumi.IDInput, state *UserState, opts ...pulumi.ResourceOption) (*User, error)

GetUser gets an existing User resource's state with the given name, ID, and optional state properties that are used to uniquely qualify the lookup (nil if not required).

func NewUser

func NewUser(ctx *pulumi.Context,
	name string, args *UserArgs, opts ...pulumi.ResourceOption) (*User, error)

NewUser registers a new resource with the given unique name, arguments, and options.

func (*User) ElementType

func (*User) ElementType() reflect.Type

func (*User) ToUserOutput

func (i *User) ToUserOutput() UserOutput

func (*User) ToUserOutputWithContext

func (i *User) ToUserOutputWithContext(ctx context.Context) UserOutput

type UserArgs

type UserArgs struct {

	// Host or network address from which the user is allowed to log in.
	Address  pulumi.StringPtrInput
	Comment  pulumi.StringPtrInput
	Disabled pulumi.BoolPtrInput
	// Name of the group the user belongs to.
	Group pulumi.StringInput
	// User name. Although it must start with an alphanumeric character, it may contain '*', '_', '.' and '@' symbols.
	Name pulumi.StringPtrInput
	// User  password. If not specified, it is left blank (hit [Enter] when logging  in). It conforms to standard Unix characteristics of passwords and may  contain letters, digits, '*' and '_' symbols.
	Password pulumi.StringPtrInput
	// contains filtered or unexported fields
}

The set of arguments for constructing a User resource.

func (UserArgs) ElementType

func (UserArgs) ElementType() reflect.Type

type UserArray

type UserArray []UserInput

func (UserArray) ElementType

func (UserArray) ElementType() reflect.Type

func (UserArray) ToUserArrayOutput

func (i UserArray) ToUserArrayOutput() UserArrayOutput

func (UserArray) ToUserArrayOutputWithContext

func (i UserArray) ToUserArrayOutputWithContext(ctx context.Context) UserArrayOutput

type UserArrayInput

type UserArrayInput interface {
	pulumi.Input

	ToUserArrayOutput() UserArrayOutput
	ToUserArrayOutputWithContext(context.Context) UserArrayOutput
}

UserArrayInput is an input type that accepts UserArray and UserArrayOutput values. You can construct a concrete instance of `UserArrayInput` via:

UserArray{ UserArgs{...} }

type UserArrayOutput

type UserArrayOutput struct{ *pulumi.OutputState }

func (UserArrayOutput) ElementType

func (UserArrayOutput) ElementType() reflect.Type

func (UserArrayOutput) Index

func (UserArrayOutput) ToUserArrayOutput

func (o UserArrayOutput) ToUserArrayOutput() UserArrayOutput

func (UserArrayOutput) ToUserArrayOutputWithContext

func (o UserArrayOutput) ToUserArrayOutputWithContext(ctx context.Context) UserArrayOutput

type UserInput

type UserInput interface {
	pulumi.Input

	ToUserOutput() UserOutput
	ToUserOutputWithContext(ctx context.Context) UserOutput
}

type UserMap

type UserMap map[string]UserInput

func (UserMap) ElementType

func (UserMap) ElementType() reflect.Type

func (UserMap) ToUserMapOutput

func (i UserMap) ToUserMapOutput() UserMapOutput

func (UserMap) ToUserMapOutputWithContext

func (i UserMap) ToUserMapOutputWithContext(ctx context.Context) UserMapOutput

type UserMapInput

type UserMapInput interface {
	pulumi.Input

	ToUserMapOutput() UserMapOutput
	ToUserMapOutputWithContext(context.Context) UserMapOutput
}

UserMapInput is an input type that accepts UserMap and UserMapOutput values. You can construct a concrete instance of `UserMapInput` via:

UserMap{ "key": UserArgs{...} }

type UserMapOutput

type UserMapOutput struct{ *pulumi.OutputState }

func (UserMapOutput) ElementType

func (UserMapOutput) ElementType() reflect.Type

func (UserMapOutput) MapIndex

func (UserMapOutput) ToUserMapOutput

func (o UserMapOutput) ToUserMapOutput() UserMapOutput

func (UserMapOutput) ToUserMapOutputWithContext

func (o UserMapOutput) ToUserMapOutputWithContext(ctx context.Context) UserMapOutput

type UserOutput

type UserOutput struct{ *pulumi.OutputState }

func (UserOutput) Address

func (o UserOutput) Address() pulumi.StringPtrOutput

Host or network address from which the user is allowed to log in.

func (UserOutput) Comment

func (o UserOutput) Comment() pulumi.StringPtrOutput

func (UserOutput) Disabled

func (o UserOutput) Disabled() pulumi.BoolPtrOutput

func (UserOutput) ElementType

func (UserOutput) ElementType() reflect.Type

func (UserOutput) Expired

func (o UserOutput) Expired() pulumi.BoolOutput

Password expired.

func (UserOutput) Group

func (o UserOutput) Group() pulumi.StringOutput

Name of the group the user belongs to.

func (UserOutput) LastLoggedIn

func (o UserOutput) LastLoggedIn() pulumi.StringOutput

Read-only field. Last time and date when a user logged in.

func (UserOutput) Name

func (o UserOutput) Name() pulumi.StringOutput

User name. Although it must start with an alphanumeric character, it may contain '*', '_', '.' and '@' symbols.

func (UserOutput) Password

func (o UserOutput) Password() pulumi.StringPtrOutput

User password. If not specified, it is left blank (hit [Enter] when logging in). It conforms to standard Unix characteristics of passwords and may contain letters, digits, '*' and '_' symbols.

func (UserOutput) ToUserOutput

func (o UserOutput) ToUserOutput() UserOutput

func (UserOutput) ToUserOutputWithContext

func (o UserOutput) ToUserOutputWithContext(ctx context.Context) UserOutput

type UserState

type UserState struct {

	// Host or network address from which the user is allowed to log in.
	Address  pulumi.StringPtrInput
	Comment  pulumi.StringPtrInput
	Disabled pulumi.BoolPtrInput
	// Password expired.
	Expired pulumi.BoolPtrInput
	// Name of the group the user belongs to.
	Group pulumi.StringPtrInput
	// Read-only field. Last time and date when a user logged in.
	LastLoggedIn pulumi.StringPtrInput
	// User name. Although it must start with an alphanumeric character, it may contain '*', '_', '.' and '@' symbols.
	Name pulumi.StringPtrInput
	// User  password. If not specified, it is left blank (hit [Enter] when logging  in). It conforms to standard Unix characteristics of passwords and may  contain letters, digits, '*' and '_' symbols.
	Password pulumi.StringPtrInput
	// contains filtered or unexported fields
}

func (UserState) ElementType

func (UserState) ElementType() reflect.Type

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL